Cyber Attack Defenders

Posts By Brian Reynolds

The holidays are upon us. It really is the most wonderful time of the year. I don’t know about you, but I for one love giving gifts, especially to my children and other family members. Nothing is more thrilling than watching their excitement.
I still remember the birthday dinner for my oldest son when he turned 13 years old and got his...

I recently received a USPS-delivered “official business” letter from the US Office of Personnel Management regarding last summer’s cyber security breach at the agency.
The letter began, “As you may know, the Office of Personnel Management (OPM) was the target of a malicious cyber intrusion carried out against the US Government, which...

The IP-enablement of physical devices is increasing in both the private and public sectors. Physical devices such as those that control access to buildings, air conditioning, and even soda dispensing machines are now controlled via an organization’s IT network.
The IP-enablement of physical devices, which is intended to increase operational...

A bombshell is defined as “an overwhelming surprise or disappointment.” For example, you open the paper one day and read that your next-door neighbor is an escaped serial killer. That’s a bombshell. A well-known politician is charged with bigamy. That’s a bombshell.
On several occasions over the last several years, high-profile cyber...

In a world where plucking low hanging fruit for cost savings is king, cloud and backup go hand-in-hand. It feels like a safe place to start when not touching production services or data sets and when dealing with the recurring costs and maintenance required for on-premise data protection solutions.
It feels safe, that is, until you start...

In Part 1 of this blog, we discussed the critical nature of the insider data breach as well as its distinct origins. We left it in a very scary place, a place where most corporations and agencies find themselves today. Security teams and data teams don’t have the answers or the ownership to address this problem head on.
So we return to...

Insider data breaches have become a serious cyber threat that every member of the IT community should be paying attention to. You don’t have to look very far to learn about these breaches and the damage they have caused. It is all over the news. The harm to A company or agency name—or even to an entire industry—can be difficult to...

Shelfware. Noun, informal. 1. Computers. software or hardware that remains unsold, unused, or underused.
/shelfweir/ Software which is never used and so ends up on the shelf. Shelfware may be purchased on a whim by an individual or group, or in accordance with corporate policy, but not actually required for any particular use.
One of my...